Researchers have found the Sharkbot Android malware hiding under the guise of antivirus solutions on Google’s Play Store. Google recently took down at least six fake antivirus apps from the store. Attackers used these malicious apps to spread Sharkbot malware, according to a recent report. By the time the store deleted the infected apps, people had downloaded them about 15,000 times.

What Is Sharkbot?

The Sharkbot malware’s main function is to steal credentials and banking information. The malware also has special features that make it dangerous. Sharkbot lures victims to enter their credentials in app screens that appear to be honest credential input forms. After a user enters their credentials, the compromised data goes to an attacker’s server.

The names of the apps Google removed from its Play Store include:

  • Atom Clean-Booster, Antivirus
  • Antivirus, Super Cleaner
  • Alpha Antivirus Cleaner
  • Powerful Cleaner Antivirus
  • Center Security – Antivirus (2 versions).

These six apps came from three developer accounts, Zbynek Adamcik, Adelmio Pagnotto and Bingo Like Inc.

Sharkbot’s Special Tactics

According to researchers, Sharkbot stands out among Android malware due to its special features. For example, the geofencing function allows Sharkbot to ignore users from China, India, Romania, Russia, Ukraine or Belarus. Special evasion methods are also part of Sharkbot’s toolbox. If the malware detects it is running in a sandbox, it stops the execution and quits.

Sharkbot implements a highly effective toolkit for bank data theft. It hijacks Accessibility Service, which provides the app with access to all data the user sees. The malware also allows the app to interact with an interface as though it were a person.

Overall, Sharkbot runs 22 malicious commands, including:

  • Request permission for sending SMS messages
  • Collect and send the device’s contact list to a server
  • Disable battery optimization so malware can run in the background
  • Send push messages
  • Imitate the user’s swipe over the screen.

Rare Android Malware Features

Another unique feature in the Sharkbot arsenal is the use of the Domain Generation Algorithm (DGA). DGA is rarely seen in Android malware. Domain generation algorithms are malware algorithms that produce a large number of domain names. The attacker can then use the domain names as contact points with malware command and control servers. The large number makes it difficult to effectively shut down botnets. Infected devices attempt to contact some of these domain names periodically to receive updates or commands.

According to the report, with DGA one sample with a hardcoded seed generates seven domains per week, and the researchers observed a total of 56 domains per week.

During the research, 27 versions of Sharkbot were identified. The main differences between the versions were different DGA seeds and variations in botnetID and ownerID fields. The recent Sharkbot takedown is another episode in the ongoing fight against infected applications.

More from News

Costa Rica State of Emergency Declared After Ransomware Attacks

In late April, after weeks of major ransomware attacks, Costa Rica declared a state of emergency. Newly-elected President Rodrigo Chaves took this measure, usually reserved to deal with natural disasters, to free up the government to react more decisively to the incident. The Russian-based Conti gang has claimed they launched the attack. Meanwhile, the U.S. Department of State offered a $10 million reward for information that leads to finding anyone holding a key leadership role in the Conti gang. The…

Ransomware-as-a-Service Transforms Gangs Into Businesses

Malware-as-a-Service is getting easier and easier to access, according to a recent threat report. Self-named the ‘Eternity Project’, this cyber threat group offers services from a Tor website and on their Telegram channel. They sell a wide variety of malware in an organized fashion, including stealer, clipper, worm, miner, ransomware and distributed-denial-of-service bot services. This alarms many security professionals. With Eternity, even inexperienced cyber criminals can target victims with a customized threat offering. Eternity sells malware for $90 to $490.…

UK Health System Email Accounts Hijacked to Steal Microsoft Logins

Last summer, I noticed password reset notices in my email account that I didn’t send. I quickly realized that I was the victim of an account takeover. This happens when someone illegally gains access to your account, typically through compromised credentials. I changed my email password right away and learned that my passwords to other accounts had already been changed. To make cleanup even more fun, I found out that the attackers had created new accounts using my credentials. Account…

LemonDuck Cryptojacking Botnet Targets API Security Gap

A recent report reveals the well-known crypto mining botnet LemonDuck can target Docker to secretly mine cryptocurrency on the Linux platform. LemonDuck targets Microsoft Exchange servers to mine crypto, escalate privileges and move sideways in compromised networks. It takes advantage of Docker, a mainstream platform used for building, running and managing containerized workloads. Since Docker runs container workloads in the cloud, a misconfigured cloud instance can expose a Docker API to the internet. Attackers can then exploit this API to…